Incidents

Peter Belony2019-06-14 00:00:00 UTC

According to the indictment, the defendants accessed victims’ personal identifying information, including names, Social Security numbers, dates of birth, and addresses on the “dark web” and then used the information to open credit cards in the victims’ names. The defendants then subscribed to Informed Delivery using the victims’ personal identifying information and a fraudulent email address created to track the delivery of credit cards to the victims’ residential mailboxes. The defendants subsequently intercepted the credit cards at the victims’ mailboxes before the victims could receive them and used those credit cards at ATMs and to purchase gift cards and other items for resale at Apple and Walmart, among other retail establishments. The defendants traveled to states across the East Coast in furtherance of the fraud, including New Hampshire, Maine, and Massachusetts.

Omar Isho2019-06-10 00:00:00 UTC

accused of selling drugs on darkweb market places

Terry Boutwell2019-06-09 00:00:00 UTC

online car sales scam

Muftau Adamu2019-06-07 00:00:00 UTC

accused of connection with a fraud scheme based in the Republic of Ghana (“Ghana”) involving the theft of over $10 million through business email compromises and romance scams that targeted elderly victims from at least 2014 through 2018.

Thomas McCormick2019-06-05 00:00:00 UTC

conspiracy to develop and distribute malware through the major computer hacking forum known as Darkode

Matjaz Skorjanc2019-06-05 00:00:00 UTC

conspiracy to develop and distribute malware through the major computer hacking forum known as Darkode

Florencio Ruiz2019-06-05 00:00:00 UTC

conspiracy to develop and distribute malware through the major computer hacking forum known as Darkode

Mentor Leniqi2019-06-05 00:00:00 UTC

conspiracy to develop and distribute malware through the major computer hacking forum known as Darkode

Gary Simon JR2019-06-05 00:00:00 UTC

According to the bill of information, on about October 21, 2018, SIMON, intentionally accessed and attempted to access a protected computer without authorization, and as a result of such conduct, recklessly caused damage, namely loss to the United States Department of Energy-Strategic Petroleum Reserve Office, in the amount of at least $5,000.

Jeffrey Batio2019-06-04 00:00:00 UTC

The fraud scheme began in 2003 and continued until 2016. Batio originally sold membership shares in his companies and offered his products for advance sales that were never fulfilled. From 2003 to 2014, Batio defrauded victims out of $5 million. As the years passed and he failed to produce or license any products, Batio in 2014 began to solicit funds on the crowdfunding website Indiegogo.com. From 2014 to 2016, Batio raised more than $700,000 on Indiegogo from investors all over the world by fraudulently promoting and selling the 3-in-1 device.

Eddy Sandoval Lopez2019-06-03 00:00:00 UTC

darknet drug vendor

Christopher Morris2019-05-31 00:00:00 UTC

The indictment alleges that Morris, an accounting professional, participated in a wire fraud scheme targeting his employer, PBS Distribution (PBSd), a media distribution business with operations in Allston and elsewhere. Morris’ position gave him access to U.S. mail addressed to PBSd’s accounting department, including checks payable to PBSd. According to the indictment, beginning as early as January 2008 and continuing through September 2012, Morris took more than $2 million in checks under the guise of depositing them into PBSd’s bank accounts, but he instead endorsed them to himself and deposited them into a personal bank account. Morris allegedly used his access to PBSd’s accounting system to conceal the theft by, among other steps, fraudulently causing credits to be issued to the accounts of customers whose checks he stole, and by causing PBSd’s general ledger to be altered to show that the same customers had made payments. It is further alleged that Morris spent the proceeds of the scheme on a lavish lifestyle that included year-long apartment rentals in New York City’s Greenwich Village and Tribeca neighborhoods; the down payment, purchase and upkeep of a waterfront condominium in Chelsea; and luxury clothing, dining and travel, including a $16,000 two-week South American cruise.

Sean Shaughnessy2019-05-30 00:00:00 UTC

According to the indictment, which was unsealed on May 24 following the defendant’s initial appearance, Mr. Shaughnessy allegedly sold fentanyl and fentanyl analogues over the dark web, an unindexed portion of the internet accessible only via specialized software that allows users to conduct transactions with relative anonymity. His buyers purchased the fentanyl and fentanyl analogues, which was shipped to their addresses, using cryptocurrencies like Bitcoin, the indictment alleges. One user, who allegedly purchased a fentanyl analogue from Mr. Shaughnessy, overdosed on the substance and died. Mr. Shaughnessy allegedly transferred his Bitcoin proceeds to other cryptocurrency wallets in exchange for regular fiat currency, which was shipped to his home in Dallas. Unbeknownst to Mr. Shaughnessy, he sent more than $120,000 bitcoin to wallet addresses controlled by federal agents. Yesterday, he was ordered to remain in federal custody. The charges in the indictment are merely allegations, and the defendant is presumed innocent until proven guilty beyond a reasonable doubt in a court of law.

Christopher Zamarripa2019-05-20 00:00:00 UTC

Zamarripa caused substantial emotional distress to his victims by altering photographs of their faces he downloaded from the Internet and placing them onto photographs of bodies engaged in explicit sexual activities, which he then uploaded to online pornographic websites. Zamarripa also uploaded to the same online pornographic websites unaltered images of two child victims.

Marat Kazandjian2019-05-19 00:00:00 UTC

accused of being the assitant to Alexander Konovolov.

Gopalkrishna Pai2019-05-17 00:00:00 UTC

The indictment alleges that from in or about May 2014, through in or about October 2018, defendant Gopalkrishna Pai conspired, devised, and engaged in a scheme to defraud merchant processors and others by submitting false information and falsified documentation to create merchant accounts in the name of Straw Companies, to process credit card and electronic payments, and to receive a substantial financial benefit. The fraudulent scheme employed by Gopalkrishna Pai disguised his involvement and use of over 100 companies formed to facilitate the processing of approximately $98 million in gross revenue in online retail sales. As a part of the conspiracy, defendant Gopalkrishna Pai owned and operated F9 Advertising LLC (hereinafter F9), a for profit limited liability company organized in Puerto Rico in May 2014 and registered under the Export Services Act, Puerto Rico Act 20 of 2012. F9 engaged in the sale of personal care products, including skin creams, via the internet utilizing a negative option marketing model. Negative option marketing is a category of commercial transactions in which sellers interpret a customer’s failure to take an affirmative action, either to reject an offer or cancel an agreement, as assent to be charged for goods or services.

Mark Bieniek2019-05-17 00:00:00 UTC

Between January 25, 2018, and February 19, 2018, Bieniek resided in North Richland Hills, Texas, while Victim 1 resided in Erie County, NY. In violation of the order of protection during this period, the defendant sent several hundred electronic messages to Victim 1 with the intent to kill, injure, harass, intimidate, or cause substantial emotional distress to Victim 1 or to place Victim 1 in reasonable fear of the death of or serious injury to herself or her partner, Victim 2. Among the messages:

Markara Man2019-05-17 00:00:00 UTC

According to court documents, on or about Dec. 19 and 20, 2017, Markara Man, 33, of Norwalk, sent three emails to Chairman Pai’s email accounts. The first email accused Chairman Pai of being responsible for a child who allegedly had committed suicide because of the repeal of net neutrality regulations. The second email listed three locations in or around Arlington and threatened to kill the Chairman’s family members. The third email had no message in its body, but included an image depicting Chairman Pai and, in the foreground and slightly out of focus, a framed photograph of Chairman Pai and his family. The FBI traced the emails to Man’s residence in Norwalk, California, and when initially confronted in May 2018, Man admitted to the FBI that he sent the email threatening Chairman Pai’s family.

Viktor Eremenko2019-05-16 00:00:00 UTC

“cash-outs” or “drop masters” on behalf of the GozNym criminal network

Alexander Konovolov2019-05-16 00:00:00 UTC

Accused leader of a cyber crime group who left 41,000 victim computers infected with GozNym and recruited various other members of the cybercrime team.

Vladimir Gorin2019-05-16 00:00:00 UTC

was a malware developer who oversaw the creation, development, management, and leasing of GozNym.

Eduard Malancini2019-05-16 00:00:00 UTC

Eduard Malanici, aka “JekaProf,” and “procryptgroup, age 32, of Balti, Moldova, provided crypting services to cybercriminals. Malanici crypted GozNym malware in furtherance of the conspiracy to enable the malware to avoid detection by anti-virus tools and protective software on victims’ computers. Malanici, along with two associates, is being prosecuted in Moldova.

Gennady Kapkanov2019-05-16 00:00:00 UTC

administrator of a bulletproof hosting service known by law enforcement and computer security researchers as the “Avalanche” network. This network provided services to more than 200 cybercriminals, including Konovolov and Kazandjian, and it hosted more than 20 different malware campaigns, including GozNym. Kapkanov’s apartment in Poltava, Ukraine was searched in November 2016 during a German-led operation to dismantle the network’s servers and other infrastructure. Kapkanov was arrested for shooting an assault rifle through the door of his apartment at Ukrainian law enforcement officers conducting the search. Through the coordinated efforts being announced today, Kapkanov is now facing prosecution in Ukraine for his role in providing bulletproof hosting services to the GozNym criminal network.

Timothy Young2019-05-16 00:00:00 UTC

allegedly selling one of his employer’s databases

Alexander Hoof2019-05-16 00:00:00 UTC

accused of being an “cash-out” or “drop master” who provided fellow members of the conspiracy with access to bank accounts he controlled that were designated to receive stolen funds from GozNym victims’ online bank accounts.

Eduard Malanici2019-05-16 00:00:00 UTC

Provided crypting services to cybercriminals. Malanici crypted GozNym malware in furtherance of the conspiracy to enable the malware to avoid detection by anti-virus tools and protective software on victims’ computers.

Konstantin Volchkov2019-05-16 00:00:00 UTC

Provided spamming services to cybercriminals. Volchkov conducted spamming operations of GozNym malware on behalf of the conspiracy. The spamming operations involved the mass distribution of GozNym malware through “phishing” emails. The phishing emails were designed to appear legitimate to entice the victim recipients into opening the emails and clicking on a malicious link or attachment, which facilitated the downloading of GozNym onto the victims’ computers.

Ruslan Katirkin2019-05-16 00:00:00 UTC

Katirkin, was a “casher” or “account takeover specialist” who used victims’ stolen online banking credentials captured by GozNym malware to access victims’ online bank accounts and attempt to steal victims’ money through electronic funds transfers into bank accounts controlled by fellow conspirators.

Farkhad Manokhin2019-05-16 00:00:00 UTC

accused “cash-outs” or “drop masters” on behalf of the GozNym criminal network. also allegde Provided fellow members of the conspiracy with access to bank accounts they controlled that were designated to receive stolen funds from GozNym victims’ online bank accounts

Karen Dickerson2019-05-10 00:00:00 UTC

According to the indictment, members of the conspiracy obtained unauthorized access to retirement savings accounts to make unauthorized wire transfers. Dickerson then coordinated with members of the conspiracy to have funds wired from those accounts into bank accounts that she controlled, and Dickerson would then withdraw the cash from her accounts.